2007 International Conference on Signal Processing, Communications and Networking 2007
DOI: 10.1109/icscn.2007.350735
|View full text |Cite
|
Sign up to set email alerts
|

B-Tree Based Trust Model for Resource Selection in Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Mirkovic and Reiher [15] "introduced a system that discards packets based on the arrival of packets from an attacker machine rather than DDOS detection to help in mitigating DDOS attack's effects". Varalakshmi et al [23], [29] "discusses the efficiency of DDOS attacks on statistical based filtering in a common context where attackers are smart. It considers different cases such as the dynamic and static property of the attacker and the mitigation".…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mirkovic and Reiher [15] "introduced a system that discards packets based on the arrival of packets from an attacker machine rather than DDOS detection to help in mitigating DDOS attack's effects". Varalakshmi et al [23], [29] "discusses the efficiency of DDOS attacks on statistical based filtering in a common context where attackers are smart. It considers different cases such as the dynamic and static property of the attacker and the mitigation".…”
Section: Related Workmentioning
confidence: 99%
“…Recently, several researchers have been worked on DDOS defense systems and lots of novel techniques have been put forward. In DDOS attack there are three major research areas: detection of attack [6], [23], [20], [19], [1], [2], [3], [29] filtering of attack [10], [5] and attack traceback [4]. Packet scoring is one of technique [9] "that gets some attributes from TCP and IP headers and then uses classification algorithm or statistic theorems to analyze packets".…”
Section: Introductionmentioning
confidence: 99%
“…Varalakshmil et al [22] have reported a trust model which is based on a reputation of a cloud provider. This model has used intermediate entities and brokers.…”
Section: Trust Models In Grid Computingmentioning
confidence: 99%
“…It has diluted the effects of wrong ratings consequences and giving accurate and quality assessment of cloud services. Zhang et al [22] have proposed a model which works on neutral factors of trusted environment. This model is consistent and trustworthy as it has used the TCCP model which has moved from third party trust to trusted platform of IaaS.…”
Section: Trust Models In Cloud Environmentmentioning
confidence: 99%
“…Today, with the expansion of service-oriented applications, more and more researchers have realized that trust has become a crucial aspect in service-oriented systems [2][3][4][5][6]. However, the dynamic nature of serviceoriented systems makes trust evaluation a challenging task.…”
Section: Introductionmentioning
confidence: 99%